Analysis

  • max time kernel
    104s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2022, 20:11

General

  • Target

    QUOTATION-XNV (92315).rtf

  • Size

    13KB

  • MD5

    0012daddc2a0ac656d2c8038f783b0f2

  • SHA1

    fbd764b61078efa98859e671ded43c9eab2ef2d8

  • SHA256

    faa0491e44d10919f30790cb570812ff03f055ac1776e1417996dee9027ce7dd

  • SHA512

    42c23b0dd02361ed8c4a3b1761a956f4f297693ed62759efd1ad830b5f42d14d3a5abb7b97fe569c3c3e34e7de55d7b54aaafa88f118ce96638e9bb81b1e39bc

  • SSDEEP

    192:0p3E92py/a+jRH2YKHrYWYslaBqsOI2WqdW7/XprtrFm:0mUYa+jtPkYVssz2xY5ri

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\QUOTATION-XNV (92315).rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4896

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4896-132-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

          Filesize

          64KB

        • memory/4896-134-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

          Filesize

          64KB

        • memory/4896-133-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

          Filesize

          64KB

        • memory/4896-135-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

          Filesize

          64KB

        • memory/4896-136-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

          Filesize

          64KB

        • memory/4896-137-0x00007FFB61FD0000-0x00007FFB61FE0000-memory.dmp

          Filesize

          64KB

        • memory/4896-138-0x00007FFB61FD0000-0x00007FFB61FE0000-memory.dmp

          Filesize

          64KB

        • memory/4896-140-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

          Filesize

          64KB

        • memory/4896-141-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

          Filesize

          64KB

        • memory/4896-142-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

          Filesize

          64KB

        • memory/4896-143-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

          Filesize

          64KB